Technical requirements
For this chapter, you are required to have a solid understanding of identity management and concepts such as Active Directory (AD), the Kerberos protocol, SAML versus OAuth 2.0, and MFA.
Following is a sample diagram which depicts the SAML authentication flow:

Figure 5.1 – Example of the SAML authentication flow to the Office 365 service
Now that you are aware of the basic concepts needed for the chapter, let's dive into the details.